74188 2002-08-29 23:03 /198 rader/ Mandrake Linux Security Team <security@linux-mandrake.com> Importerad: 2002-08-29 23:03 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Mottagare: Bugtraq (import) <1323> Ärende: MDKSA-2002:055 - hylafax update ------------------------------------------------------------ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ Mandrake Linux Security Update Advisory ________________________________________________________________________ Package name: hylafax Advisory ID: MDKSA-2002:055 Date: August 28th, 2002 Affected versions: 7.1, 7.2, 8.0, 8.1, 8.2, Corporate Server 1.0.1 ________________________________________________________________________ Problem Description: Numerous vulnerabilities in the HylaFAX product exist in versions prior to 4.1.3. It does not check the TSI string which is received from remote FAX systems before using it in logging and other places. A remote sender using a specially formatted TSI string can cause the faxgetty program to segfault, resulting in a denial of service. Format string vulnerabilities were also discovered by Christer Oberg, which exist in a number of utilities bundled with HylaFax, such as faxrm, faxalter, faxstat, sendfax, sendpage, and faxwatch. If any of these tools are setuid, they could be used to elevate system privileges. Mandrake Linux does not, by default, install these tools setuid. Finally, Lee Howard discovered that faxgetty would segfault due to a buffer overflow after receiving a very large line of image data. This vulnerability could conceivably be used to execute arbitrary commands on the system as root, and could also be exploited more easily as a denial of sevice. ________________________________________________________________________ References: http://www.securityfocus.com/archive/1/215984 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-1034 http://www.securityfocus.com/bid/3357 ________________________________________________________________________ Updated Packages: Linux-Mandrake 7.1: 1bbb83c824d07e017a36c2c85b92c3b7 7.1/RPMS/hylafax-4.1-0.11mdk.i586.rpm 3f4e469a6c57529fe02025ea7b4bef45 7.1/RPMS/hylafax-client-4.1-0.11mdk.i586.rpm 9b0952a5701bc2ffaa6068b4b0901ede 7.1/RPMS/hylafax-server-4.1-0.11mdk.i586.rpm c44d130f10049d79f7a60601b9844b6e 7.1/SRPMS/hylafax-4.1-0.11mdk.src.rpm Linux-Mandrake 7.2: 37c7c3efa774714204c22e6bde81f432 7.2/RPMS/hylafax-4.1-0.11mdk.i586.rpm 37cb7b798ffaf93aba0782b4fb760a39 7.2/RPMS/hylafax-client-4.1-0.11mdk.i586.rpm b28df42826dc9a833c7f19ad92dacbec 7.2/RPMS/hylafax-server-4.1-0.11mdk.i586.rpm c44d130f10049d79f7a60601b9844b6e 7.2/SRPMS/hylafax-4.1-0.11mdk.src.rpm Mandrake Linux 8.0: a3676fb894765134d5669f914e39f10c 8.0/RPMS/hylafax-4.1.3-1.1mdk.i586.rpm 27c72f3ad72e85abc4c527fa44d625e9 8.0/RPMS/hylafax-client-4.1.3-1.1mdk.i586.rpm b1effc6accf5c808694ee312abf08140 8.0/RPMS/hylafax-server-4.1.3-1.1mdk.i586.rpm 070d143881cf21632484fcd65fad1aa0 8.0/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.i586.rpm a4f1487efa5cc026103d80c96dd41a43 8.0/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.i586.rpm ff2a96e07f08a70a8f0d9b734a37c122 8.0/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm Mandrake Linux 8.0/ppc: e51efc370f2bb4af971457edd5dda1e9 ppc/8.0/RPMS/hylafax-4.1.3-1.1mdk.ppc.rpm 3b15cb44ed18c353c154e7d97fecc4ba ppc/8.0/RPMS/hylafax-client-4.1.3-1.1mdk.ppc.rpm 73af1b321e30ed8d7740c1e8a0b60a67 ppc/8.0/RPMS/hylafax-server-4.1.3-1.1mdk.ppc.rpm 6225da0393fd8f80c2dfebd85df5998e ppc/8.0/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.ppc.rpm eac3efd3d7c5184312bd4aa793a8a8e7 ppc/8.0/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.ppc.rpm ff2a96e07f08a70a8f0d9b734a37c122 ppc/8.0/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm Mandrake Linux 8.1: 1947a6895cdfe3c4bda4fc100b3c1276 8.1/RPMS/hylafax-4.1.3-1.1mdk.i586.rpm 13fcd879330de0cb58bc8c8c99595291 8.1/RPMS/hylafax-client-4.1.3-1.1mdk.i586.rpm 2450c7ec306a4e5c9e6a73d8d09bafc6 8.1/RPMS/hylafax-server-4.1.3-1.1mdk.i586.rpm 862d14c12e65ee9f82451ad911bc8df7 8.1/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.i586.rpm f5b5c5a4b3137277793adf385ffba962 8.1/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.i586.rpm ff2a96e07f08a70a8f0d9b734a37c122 8.1/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm Mandrake Linux 8.1/ia64: 07a96e577b97485a6d723743196ad248 ia64/8.1/RPMS/hylafax-4.1.3-1.1mdk.ia64.rpm 1d2ee7c691e72978ea49c0eec3c945b4 ia64/8.1/RPMS/hylafax-client-4.1.3-1.1mdk.ia64.rpm 248d6879e45952ae2c9494e91297b0b6 ia64/8.1/RPMS/hylafax-server-4.1.3-1.1mdk.ia64.rpm 3f48d8f2283917f3b451dcaf9deb3edf ia64/8.1/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.ia64.rpm 16dee4b27fc1fc63ccd377e1340d371c ia64/8.1/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.ia64.rpm ff2a96e07f08a70a8f0d9b734a37c122 ia64/8.1/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm Mandrake Linux 8.2: e3c962f212ba5faf2bbbf9bbe97ac39b 8.2/RPMS/hylafax-4.1.3-1.1mdk.i586.rpm 27d3a86f8bd39560468fdc5b9be66269 8.2/RPMS/hylafax-client-4.1.3-1.1mdk.i586.rpm 60f4529da79fcc543502d650a2782178 8.2/RPMS/hylafax-server-4.1.3-1.1mdk.i586.rpm 0f2044dfb51f6b086f0620965f810da3 8.2/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.i586.rpm 0542d8bd7f1f98784af674c107ede594 8.2/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.i586.rpm ff2a96e07f08a70a8f0d9b734a37c122 8.2/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm Mandrake Linux 8.2/ppc: 72c6a45d7a11fb1b69a3fd8ebb9b0fc8 ppc/8.2/RPMS/hylafax-4.1.3-1.1mdk.ppc.rpm a26c8f863ac3b71ebea178e3a946b173 ppc/8.2/RPMS/hylafax-client-4.1.3-1.1mdk.ppc.rpm 16bab89e373b104b3cbe910e103297e8 ppc/8.2/RPMS/hylafax-server-4.1.3-1.1mdk.ppc.rpm a2fe9322f593f6d56f319c439e4a952d ppc/8.2/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.ppc.rpm 2d60a7ab5d1b41b85511f3302a5044de ppc/8.2/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.ppc.rpm ff2a96e07f08a70a8f0d9b734a37c122 ppc/8.2/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm Corporate Server 1.0.1: 1bbb83c824d07e017a36c2c85b92c3b7 1.0.1/RPMS/hylafax-4.1-0.11mdk.i586.rpm 3f4e469a6c57529fe02025ea7b4bef45 1.0.1/RPMS/hylafax-client-4.1-0.11mdk.i586.rpm 9b0952a5701bc2ffaa6068b4b0901ede 1.0.1/RPMS/hylafax-server-4.1-0.11mdk.i586.rpm c44d130f10049d79f7a60601b9844b6e 1.0.1/SRPMS/hylafax-4.1-0.11mdk.src.rpm ________________________________________________________________________ Bug IDs fixed (see https://qa.mandrakesoft.com for more information): ________________________________________________________________________ To upgrade automatically, use MandrakeUpdate. The verification of md5 checksums and GPG signatures is performed automatically for you. If you want to upgrade manually, download the updated package from one of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A list of FTP mirrors can be obtained from: http://www.mandrakesecure.net/en/ftp.php Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig <filename> All packages are signed by MandrakeSoft for security. You can obtain the GPG public key of the Mandrake Linux Security Team from: https://www.mandrakesecure.net/RPM-GPG-KEYS Please be aware that sometimes it takes the mirrors a few hours to update. You can view other update advisories for Mandrake Linux at: http://www.mandrakesecure.net/en/advisories/ MandrakeSoft has several security-related mailing list services that anyone can subscribe to. Information on these lists can be obtained by visiting: http://www.mandrakesecure.net/en/mlist.php If you want to report vulnerabilities, please contact security@linux-mandrake.com ________________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security@linux-mandrake.com> - -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.0.7 (GNU/Linux) mQGiBDlp594RBAC2tDozI3ZgQsE7XwxurJCJrX0L5vx7SDByR5GHDdWekGhdiday L4nfUax+SeR9SCoCgTgPW1xB8vtQc8/sinJlMjp9197a2iKM0FOcPlkpa3HcOdt7 WKJqQhlMrHvRcsivzcgqjH44GBBJIT6sygUF8k0lU6YnMHj5MPc/NGWt8wCg9vKo P0l5QVAFSsHtqcU9W8cc7wMEAJzQsAlnvPXDBfBLEH6u7ptWFdp0GvbSuG2wRaPl hynHvRiE01ZvwbJZXsPsKm1z7uVoW+NknKLunWKB5axrNXDHxCYJBzY3jTeFjsqx PFZkIEAQphLTkeXXelAjQ5u9tEshPswEtMvJvUgNiAfbzHfPYmq8D6x5xOw1IySg 2e/LBACxr2UJYCCB2BZ3p508mAB0RpuLGukq+7UWiOizy+kSskIBg2O7sQkVY/Cs iyGEo4XvXqZFMY39RBdfm2GY+WB/5NFiTOYJRKjfprP6K1YbtsmctsX8dG+foKsD LLFs7OuVfaydLQYp1iiN6D+LJDSMPM8/LCWzZsgr9EKJ8NXiyrQ6TGludXggTWFu ZHJha2UgU2VjdXJpdHkgVGVhbSA8c2VjdXJpdHlAbGludXgtbWFuZHJha2UuY29t PohWBBMRAgAWBQI5aefeBAsKBAMDFQMCAxYCAQIXgAAKCRCaqNDQIkWKmK6LAKCy /NInDsaMSI+WHwrquwC5PZrcnQCeI+v3gUDsNfQfiKBvQSANu1hdulqIRgQQEQIA BgUCOtNVGQAKCRBZ5w3um0pAJJWQAKDUoL5He+mKbfrMaTuyU5lmRyJ0fwCgoFAP WdvQlu/kFjphF740XeOwtOqIRgQQEQIABgUCOu8A6QAKCRBynDnb9lq3CnpjAJ4w Pk0SEE9U4r40IxWpwLU+wrWVugCdFfSPllPpZRCiaC7HwbFcfExRmPaIRgQQEQIA BgUCPI+UAwAKCRDniYrgcHcf8xK5AKCm/Mq8qP8GE0o1hEX22QsJMZwH5gCfZ72H 8TacOb3oAmBdprf+K6gkdOiIRgQQEQIABgUCOtOieAAKCRCv2bZyU0yB80MeAJ9K +jXt0cKuaUonRU+CRGetk6t9dgCfTRRL6/puOKdD6md70+K5EBBSvsG0OE1hbmRy YWtlIExpbnV4IFNlY3VyaXR5IFRlYW0gPHNlY3VyaXR5QG1hbmRyYWtlc29mdC5j b20+iFcEExECABcFAjyPnuUFCwcKAwQDFQMCAxYCAQIXgAAKCRCaqNDQIkWKmFi+ AJsHhohgnU3ik4+gy3EdFlB2i/MBoACg6lHn5cnVvTcmgNccWxeNxLLZI5e5AQ0E OWnn7xAEAOQlTVY4TiNo5V/iP0J1xnqjqlqZsU7yEBKo/gZz6/+hx75RURe1ebiJ 9F779FQbpJ9Epz1KLSXvq974rnVb813zuGdmgFyk+ryA/rTR2RQ8h+EoNkwmATzR xBXVJb57fFQjxOu4eNjZAtfII/YXb0uyXXrdr5dlJ/3eXrcO4p0XAAMFBACCxo6Z 269s+A4v8C6Ui12aarOQcCDlV8cVG9LkyatU3FNTlnasqwo6EkaP572448weJWwN 6SCXVl+xOYLiK0hL/6Jb/O9Agw75yUVdk+RMM2I4fNEi+y4hmfMh2siBv8yEkEvZ jTcl3TpkTfzYky85tu433wmKaLFOv0WjBFSikohGBBgRAgAGBQI5aefvAAoJEJqo 0NAiRYqYid0AoJgeWzXrEdIClBOSW5Q6FzqJJyaqAKC0Y9YI3UFlE4zSIGjcFlLJ EJGXlA== =yGlX - -----END PGP PUBLIC KEY BLOCK----- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE9boRjmqjQ0CJFipgRAougAJ4iW8vJLzjt8Sn/HLRxb+cUgtoUTgCbBqas Cr17AZYeMB+5mAA1SqvLuf8= =Ba7y -----END PGP SIGNATURE----- (74188) /Mandrake Linux Security Team <security@linux-mandrake.com>/(Ombruten)